Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Network Security Implemented With Intelligent Agent Through Multi-Agent System


Affiliations
1 Uttrakhand Technical University, Dehradun, Uttarakhand, India
2 Galgotia University, Greater Noida, Uttar Pradesh, India
     

   Subscribe/Renew Journal


Security is the process of maintaining an acceptable level of perceived risk. Nowadays, security management has become an important issue that must be considered carefully. Security is required in any organization/institute to protect its hardware, software and data resources against known or sometimes unknown resources [1]. These unknown resources cause risk to our system. Unknown resources can be inserted into system intentionally or unintentionally. We focus on one critical security management issue that is intrusion detection. So, we propose an approach for security management using intelligent agent model [2]. This model provides a flexible integration of multi-agent technique in a classical network to enhance its protection level against inherent attacks. A multi-agents system, which aims at detecting intrusions in a complex network. Multi-agents systems provide a suitable solution. So, we applied a well-known multi-agent methodology and showed that it is useful for real-life application [2]. We also used agent knowledge, with BDI theoretical model.

Keywords

Distributed network management, Intelligent Agents, Intrusion Detection, Multi-Agent System, Network Security Management.
Subscription Login to verify subscription
User
Notifications
Font Size


  • K. Boudaoud, H. Labiod, R. Boutaba, and Z. Guessoum, “Network security management with intelligent agents,” NOMS 2000. 2000 IEEE/IFIP Network Operations and Management Symposium ‘The Networked Planet: Management Beyond 2000’ (Cat. No. 00CB37074), Honolulu, USA, Apr. 10-14, 2000.
  • K. Boudaoud, and Z. Guessoum, “A multi-agents system for network security management,” Telecommunication Network Intelligence, IFIP TC6 WG6.7 Sixth Int. Conf. on Intelligence in Networks (SMARTNET 2000), Vienna, Austria, Sept. 18-22, 2000.
  • H. K. Song, K. M. Kim, K. T. Kim, and H. Y. Youn, “Application of genetic algorithm for logistics based on multi-agent system,” In 2013 Int. Conf. on Information Networking (ICOIN), vol. 1, pp. 309-314, IEEE, 2013.
  • S. Bijani, and D. Robertson, “A review of attacks and security approaches in open multi-agent systems,” Artificial Intelligence Review, pp. 1-30, Springer, May, 2012.
  • W. Ho, H. Higson, P. K. Dey, X. Xu, and R. Bahsoon, “Measuring performance of virtual learning environment system in higher education,” Quality Assurance in Education, vol. 17, no. 1, pp. 6-29, 2009.
  • R. H. Bordini, A. E. F. Seghrouchni, and M. Dastani, Multi-Agent Programming: Languages, Platforms and Applications, Springer, 2009.
  • T. Erl, A. Karmarkar, P. Walmsley, H. Haas, ....... and J. Pasley, Web Service Contract Design and Versioning for SOA, Prentice Hall, 2009.
  • “E-business systems,” International Journal of Business and Information, vol. 3, no. 1, pp. 129-143, 2008.
  • E. M. van Raaij, and J. J. L. Schepers, “The acceptance and use of a virtual learning environment in China,” Computers & Education, vol. 50, no. 3, pp. 838-852, 2008.
  • A. Kannammal, and N. Iyengar, “A framework for mobile agent security in distributed agent based e-business systems,” International Journal of Business and Information, vol. 3, no. 1, pp. 129-143, 2008.
  • S. D. Ramchurn, D. Huynh, and N. R. Jennings, “Trust in multi-agent systems,” The Knowledge Engineering Review, vol. 19, no. 1, pp. 1-25, 2004.
  • M.-H. Lin, C.-C. Chang, and Y.-R. Chen, “A fair and secure mobile agent environment based on blind signature and proxy host,” Computers & Security, vol. 23, no. 3, pp. 199-212, 2004.
  • D. Tavangarian, M. E. Leypold, K. Nölting, M. Röser, and D. Voigt, “Is e-learning the solution for individual learning,” Electronic Journal of e-Learning, vol. 2, no. 2, pp. 273-280, 2004.
  • Z. Guessoum, and J.-P. Briot. “From active object to autonomous agents,” IEEE Concurrency, vol. 7, no. 3, pp. 68-78, July/September, 1999.
  • R. F. Teixeira, and D. Oliveira, “Gestion des réseaux avec connaissance des besoins: Utilisation des agents logiciel,” PhD Thesis, Eurécom Institute, France, 1998.
  • S. Corley, and et al., “The application of intelligent agent technologies to network and service management,” 5th IS&N Conf., Antwerpen, Belgium, May 25-28, 1998.
  • J. Ferber, and O. Gutknecht, “A meta-model for the analysis and design of organizations in multi-agent systems,” ICMAS, 1998.
  • G. B. White, E. A. Fisch, and U. W. Pooch, “Cooperating security managers: A peer-based intrusion detection system,” IEEE Network, vol. 10, no. 1, pp. 20-23, January/February, 1996.
  • J. Ferber, Les Systèmes Multi-Agents, Vers Une Intelligence Collective, InterEd. 1995.
  • A. Rao, and M. Georgeff, “BDI Agents: From Theory to Practice,” Tech. Note 56, 1995.
  • M. Wooldridge, and N. R. Jennings, “Intelligent agents: Theory and practice,” Knowledge Engineering Review, vol. 10, no. 2, pp. 115-152, 1995.

Abstract Views: 222

PDF Views: 0




  • Network Security Implemented With Intelligent Agent Through Multi-Agent System

Abstract Views: 222  |  PDF Views: 0

Authors

Meena Sachdeva
Uttrakhand Technical University, Dehradun, Uttarakhand, India
Avadhesh Kumar
Galgotia University, Greater Noida, Uttar Pradesh, India

Abstract


Security is the process of maintaining an acceptable level of perceived risk. Nowadays, security management has become an important issue that must be considered carefully. Security is required in any organization/institute to protect its hardware, software and data resources against known or sometimes unknown resources [1]. These unknown resources cause risk to our system. Unknown resources can be inserted into system intentionally or unintentionally. We focus on one critical security management issue that is intrusion detection. So, we propose an approach for security management using intelligent agent model [2]. This model provides a flexible integration of multi-agent technique in a classical network to enhance its protection level against inherent attacks. A multi-agents system, which aims at detecting intrusions in a complex network. Multi-agents systems provide a suitable solution. So, we applied a well-known multi-agent methodology and showed that it is useful for real-life application [2]. We also used agent knowledge, with BDI theoretical model.

Keywords


Distributed network management, Intelligent Agents, Intrusion Detection, Multi-Agent System, Network Security Management.

References